Sunteți pe pagina 1din 4

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 4 Issue: 5 212 - 215


________________________________________________________________________________________________________
Detecting Malicious Applications from the cloud by using user feedback method

Prof. Chetan J. Shelke Dr. P. P. Karde Dr. V. M. Thakre


Head,Dept of IT Head.,Dept of CSE Head,Dept of CSE
P.R.Patil College of Engineering Government Polytechnic Amravati, Sant Gadge Baba Amravati University
Amravati, p_karde@rediffmail.com Amravati,
Chetanshelke7@gmail.com vilthakre@yahoo.com

Abstract As in recent period of computers and internets, mobiles devices, Smartphones plays a vital role in human day to day activities. Also
now a days Smartphones & tablets are becoming very popular especially android based Smartphones are gaining much more popularity as
compared to Apples iOS. These Smartphones having lot of applications and features based on only internet but these new emerging features of
these devices give opportunity to new malwares & threats. Android is comparatively new OS hence its makes very hard to detect and prevent
these viruses and malwares attacks by using some basic traditional mechanisms. So security of these Smartphones is now becoming very
popular issue of researchers. The lack of standard security mechanism in Android applications is very useful to hackers. So to overcome these
various pitfalls we use cloud services as a security weapon for providing decent security system for Android applications.

Keywords- Android OS, Smartphones, Malwares, Cloud Services, Applications Security.


__________________________________________________*****_________________________________________________

I. INTRODUCTION security applications are applied on the replicas that had been
created.
Recently the use of Smartphones based on Android OS has II. PROBLEM DEFINATION
increased rapidly hence providing better security policies is
becoming most important area of research. As Smartphones One big benefit of shifting the security functionality into the
devices are being rapidly utilized by enterprises, and various mobile network is the almost indefinite processing power and
government agencies also in military services, security plays battery capacity. This makes it possible to run very resource
an important role, because many users uses these devices to intense security services that would not be feasible on the
hold their valuable sensitive data, attackers may use this phone. If the phone is replicated in the mobile network, this
sensitive information with wrong intent. Mobile viruses can also allows the developer of a security service to extend this
cause many types of damages like, private data leakage, service without changes on the phone. The security service can
remote listening etc. also they can congest the servers by examine the phone not only from inside its system (similar to
sending many unwanted messages and spams and reduces the an application on the phone), but it can also monitor the
efficiency of communication network. Hence in order to replica itself which runs the mobile network (e.g. look at the
control these malware attacks in Smartphones some crucial connections the replicated phone attempts to make). This can
steps must be taken to provide some efficient mechanism for further improve the chances of finding malicious software and
controlling the growth and productions of these viruses. open up possibilities that would not be feasible on the device
itself. For example, detecting a root kit could be impossible on
Anti-virus research is recently ongoing process for identifying the phone itself, but a security service which only scans the
and analyzing new and unknown malware for extracting replicas files without executing the replica, might be able to
possible detection scheme that can be used within some anti- detect the root kit. But the shifting of the security functionality
virus software. There exits some virus and malware detector into the mobile network could also be problematic, if not all
software that can scan and block viruses, Trojans that are parts of the phone can be replicated into the mobile network.
infecting Android applications. Most malwares is being Previous work has shown that it is possible to run smartphone
detected by scanning in signature database. For generating the applications in the mobile network (e.g. [10]).
reports and special signatures the infected application need to
be analyzed and carefully observed so that we can collect Smartphones typically possess only a limited amount
some meaningful pattern about the specific malware. One of battery capacity and processing power. Once the security
approach to transfers the limited functionality of functionality is applied outside the physical device, these
Smartphones, is to off-load workload into the cloud. Taking limitations can be circumvented.
advantage of the cloud is a very good approach, since a service
in the cloud can be changed as needed, but modifications to Emulating the smartphone in the mobile network
the Smartphones devices are very difficult. There are various comes with one problem: every different smartphone needs its
applications like CloneDroid [1] which introduces the idea of own emulator to be perfectly emulated. Since the phones
offloading parts of programs into a cloud for speeding-up and typically differin certain aspects (e.g., operating system,
saving power. Also ParanoidAndroid [2] offers a system in available sensors, etc.), no emulator can simulate more than
which the device is replicated into the cloud, and various one smartphone perfectly. To support multiple devices, many
different emulators need to be implemented. Another approach
212
IJRITCC | May 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 5 212 - 215
________________________________________________________________________________________________________
would be to implement a more generic emulator which can applications for smartphones. The detection of these malicious
support more than one device. This is the case for Android applications is not done on the smartphone itself, but in a
devices where one emulator can represent many different different environment, for instance, a mobile network, where
devices, with the downside that these devices are not emulated the detection algorithm is applied to a virtual smartphone. The
accurately. whole system containing all parts is called the Security
System, the part in the mobile network is called Security
Since the purpose of the security system is the Service. There are various reasons for the domain change from
detection of malicious applications, such applications do not the smartphone to the mobile network: Applying the security
pose a security threat per se. A malicious application can only functionality on a virtual device and not on the real
influence the security system if it tries to manipulate the smartphone offers the possibility to run analysis that would be
system itself, for instance, by modifying the generated images problematic otherwise. For a normal smartphone, which is
or user interactions. To prevent this, these files must be stored managed by an customer, it might be infeasible to install a
in a secure way, and the integrity of the files and the security custom firmware, or modify parts of the operating system for
systems components on the smartphone and inside the mobile certain checks, which has to be done e.g., for taint checking .
network have to be guaranteed. The integrity can be The virtual device does not have these barriers, it can be
guaranteed by implementing cryptographic principles (e.g., by changed arbitrarily for every malware detection concept as
using file checksums, or by signing the components using needed. The virtualisation of the smartphone also has the
public key cryptography [3,6]). If the integrity is not benefit of posing no risk to real hardware. If the virtual device
guaranteed, the security services announcements become gets damaged, e.g. by a malicious application, it can just be
useless, since a malicious application can hide itself from recreated without any cost. Another benefit of such a security
detection (e.g., by not copying itself into the images), or trick system is the centralization of the malware detection. In
the security service into reporting other applications as addition, they are able to accurately decide what to check and
malicious, even if they are not. Since the components of the monitor the results. This process can even be done on a daily
security service for different smartphone users do not basis.
influence each other, a compromised smartphone can not
disrupt the whole security system. Android has more than 100 permissions, and broadcasts, thus
it gives us a probable number of combinations of permissions
At present there exists several systems for detecting and broadcasts which can be saved as malware definitions and
and avoiding malwares and malwares available in android later used for comparison with application signatures, which
applications but apart from this there are some shortcomings would help us to separate the malicious applications from the
presents in these system which are good ones.

1. Existing malware detection mechanism are very time Once the applications are filtered then malicious
consuming process as each time consuming process applications will be reported on to the mobile network so that
as each time a new application downloaded have to everyone using these secure application can be informed about
be checked and analyzed for behavior patterns and the malware applications which are installing or already
datasets are recorded and stored. installed on their devices. This technique would work for
2. Extremely worst battery performance as Antimalware applications which are being installed on our devices or are
application and other processes has to be run in being installed on our devices. Once detected the filtered
background. applications are removed from our device and our phone is
3. There are several approaches of detecting malwares. free from malwares. In this approach we can also use a Smart
Anomaly detection is one of them in which various Agent, which would be a dummy malware, and try to access
behavior patterns are observed and stored in various sensitive data on our phone, then trace its own behavior while
datasets. The main drawback of this is that, one have accessing the data. Once the behavior is traced, then this
to maintain large datasets and as no. of datasets behavior can be compared with other programs to track if they
increases then there also exists problem of are also accessing data in a similar manner, thereby marking
inconsistency and redundancy. them as malwarees and reporting them over the mobile
4. Existing system Crowroid which detects Trojans like network. Thus making our system more robust and prone to
malwares on Android using analyzing no. of system malwarees and malwares.
calls each time is executed.
In research work first of all applications will checked
III. IMPLEMENTATION and analyzed for various patterns and signatures.

According to the limitations and shortcoming stated in the For new application (without log on mobile network)
literature survey it has been found that the in most of the work For any new application without log on mobile network it will
the security mechanism deploy on smartphone itself rather on first check for malwares without installing it for abnormal
mobile network. patterns and signatures.

Proposed System Flow


This proposed work will introduces an architecture The downloaded application from market then it will be
for a security system, which will detects malicious checked for malwares using the user feedback available on
213
IJRITCC | May 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 5 212 - 215
________________________________________________________________________________________________________
mobile network if feedback is positive then system will developed, and updating it on the user's phone as soon as new
informs the user that application may contain malware, if it is entries are added to the database. The signature updation
negative, a user can install the application. But if feedback would be done in two ways,
about an application is not present on mobile network then it
will check for malware by scanning in signature database if a. By manually updating the online signatures
the signatures not matched then it will inform the user that b. By auto updating the online signatures
feedback as well as malicious signature are not present then
they may install the application on there own risk. In manual updation, we would be manually adding malware
signatures and giving the user's regular timely updates so that
The following methods would be used in our project the user's phone can be secured.In auto updation mode, the
for development of the security provider application on user feedback about the application would be used and the
Android, reported application's signature would be saved and pattern
recognition techniques like Hidden Markov Model or
1. User Feedback Methods: Android leverages a vast Gaussian Mixture model would be used in order to check for
amount of users which are actively using applications matching signature patterns and then these patterns would be
and facing issues with these applications. We would updated on the user's mobile so that the user can be protected
develop a feedback model where the users would be from applications which are reported by other user's with the
able to report malicious applications on help of signature analysis. And also represent a social malware
2. mobile network servers and this would define the detection.
score of these applications. If the number of reports
for a given application are above a certain level, then IV. CONCLUSION
we would mark the application as a malware
application. In future if any other user tries to Thus this paper introduced a security mechanism for
download and install the same application then Smartphones, which uses user feedback report generated by
security provider would actively scan the application user, to check whether the application is malicious or not. We
and recommend to the user that this application has a uses apriori algorithm for malware detection. As Smartphones
potential security threat. are very much prone to viruses and malwares hence we
implements new approach of using cloud as a security weapon
2. Application offline scanning: Each android application is for providing security. Also we provided user feedback
made up of the following components, analysis as a solution to the problems of malwares in Android
applications
a. Activities: The number of screens the application
has REFERENCES
b. Services: The number of background processes by
these applications [1] M. Becher, F. Freiling, and B. Leider. On the effort to
c. Broadcast receivers: The number of event receivers create smartphone worms in windows mobile, Information
for this application Assurance and Security Workshop, 2007. IAW 07.
d. Permissions: The number of components this IEEESMC, pages 199206, 20-22 June 2007.
[2] J. Burns. Developing secure mobile applications for
application has been granted access android - an introduction to making secure android
applications,https://www.isecpartners.com/files/iSEC_Sec
The user is shown the permissions before the uring_ Android_Apps.pdf, 2008. [Online; accessed 05-Sep-
application is installed, and if the user feels that the application 2013].
has an unwanted behaviour, the application installation can be [3] W. Enck, M. Ongtang, and P. McDaniel. Understanding
cancelled by the user. Most malware affected applications take android security, IEEE Security and Privacy, 7(1):5057,
advantage of the user's negligence and ask for permissions 2009. [Online; accessed 02-Sep-2013].
which are not even needed by these applications. Example, a [4] C. Mulliner. Advanced attacks against pocketpc phones.
game might ask for permissions to access the messages, call 2006. [Online; accessed 04-Sep-2013].
[5] C. Mulliner. Exploiting symbian: Symbian exploitation
logs and the internet, even though it's normal functionality and shellcode development, http://mulliner.org/
does not depend upon these parameters. Thus, the user might symbian/feed/CollinMulliner_Exploiting_
install the application and it might send all the device's Symbian_BlackHat_ Japan_2008.pdf, 2008. Talk on
messages and call logs to an unknown server online, which is BlackHat Japan 2008, visited 15.6.2009.
like spying on the user. [6] M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S.
Uellenbeck, and C.Wolf, Mobile Security Catching Up?
To avoid it, this work develop an offline application scanner Revealing the Nuts and Bolts of the Security of Mobile
program which would scan the application signatures and Devices ,in Proceedings IEEE Security and Privacy, May
show the level of maliciousness for the given application, 2011. [Online; accessed 04-Sep-2013].
[7] C. R. Mulliner, Security of Smart Phones, Masters
there by the user decides either to keep the application or to thesis, University of California, Santa Barbara, 2006.
remove it. [Online; accessed 04-Sep-2013].
[8] G. Lawton. Is it finally time to worry about mobile
3. Online application signature check with assistive user malware?, Computer, 41(5):1214, 2008.
feedback: In this method, online signature database will be
214
IJRITCC | May 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 4 Issue: 5 212 - 215
________________________________________________________________________________________________________
[9] Google Mobile Blog, An Update on Android Market
Security, March 2011. [Online]. Available:
http://googlemobile.blogspot.com/ 2011/03/update-on-an-
droid-market-security.html
[10] D. K. Goldhammer, D. A. Wiegand, D. Becker, and M.
Schmid. Goldmedia mobile life report 2012, mobile life in
the 21st century, status quo
andoutlook,http://www.b\itkom.org/60376.aspx?url=0810
09_bitkom_goldmedia_mobile_life_ 2012(1).pdf. [Online;
accessed 01-May-2010].
[11] J. Six, Android architecture. In Application Security for
the Android Platform, Sebastopol, CA, ORielly Media
2011, pp 1324
[12] M. Becher, F. Freiling, and B. Leider. On the effort to
create smartphone worms in windows mobile, In
Information Assurance and Security Workshop, 2007. IAW
07. IEEESMC, pages 199206, 20-22 June 2007.
[13] J. Bergeron, M. Debbabi, J. Desharnais, M. M. Erhioui, Y.
Lavoie, and N. Tawbi. Static detection of malicious code
in executable programs, In Proceedings of the Symposium
on Requirements Engineering for Information Security
(SREIS01), 2001.

215
IJRITCC | May 2016, Available @ http://www.ijritcc.org
_______________________________________________________________________________________

S-ar putea să vă placă și